IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions White Papers (View All Report Types)
 
Building the Next-Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.
Posted: 26 Apr 2016 | Published: 06 Apr 2016

Oracle Corporation

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' demands rising, it is hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

SCIENCELOGIC: Unmatched Visibility into Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

ESG Lab Validation Report: McAfee Next Generation SIEM
sponsored by Intel Security
WHITE PAPER: Access this ESG lab validation report to discover unbiased answers and expertise as to how a holistic security approach, which can leverage multiple interconnected security solutions as a unified ecosystem, might be the answer to today's frustrating IT security dilemmas.
Posted: 06 May 2016 | Published: 30 Apr 2015

Intel Security

A Seamless Path to the Hybrid Cloud
sponsored by F5 Networks
WHITE PAPER: Explore how you can couple Microsoft Azure's public cloud environment with secure networking controls to transition seamlessly to hybrid cloud. Learn about the security and networking benefits, and delve into several use case scenarios for deployment.
Posted: 09 May 2016 | Published: 09 May 2016

F5 Networks

Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER: Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment
sponsored by Amazon Web Services
WHITE PAPER: Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.
Posted: 23 May 2016 | Published: 31 Jul 2015

Amazon Web Services

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement